The study explores the risks and tradeoffs when adapting enterprise-IT security and zero trust principles to weapon systems.
Software bills of materials or SBOMs are critical to software security and supply chain risk management. Regardless of the SBOM tool, the output should be consistent for a given piece of software. But ...
DeCapria, D., 2025: DataOps: Towards More Reliable Machine Learning Systems. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
This collection includes presentations and videos from the Secure Software by Design Conference held on August 19-20, 2025, in Arlington, VA.
Complete the form below to register and download a free online copy of SEI CERT C++ Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems in C++ (2016 Edition).
Executive Order 13587 requires federal agencies that operate or access classified computer networks to implement an insider threat detection and prevention program. Proposed changes to the National ...
Schmidt, D., and Sledge, C., 2016: A Naval Perspective on Open-Systems Architecture. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Snoke, T., Shick, D., and Horneman, A., 2013: Working with the Internet Census 2012. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Carleton, A., Robert, J., Klein, M., and Harper, E., 2021: Software Engineering as a Strategic Advantage: A National Roadmap for the Future. Carnegie Mellon ...
Critical Asset Identification (Part 1 of 20: CERT Best Practices to Mitigate Insider Threats Series)
Ruefle, R., 2017: Critical Asset Identification (Part 1 of 20: CERT Best Practices to Mitigate Insider Threats Series). Carnegie Mellon University, Software ...
Cassidy, T., and CERT Insider Threat Center, T., 2018: Substance Use and Abuse: Potential Insider Threat Implications for Organizations. Carnegie Mellon University ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results